Secret sharing schemes with general access structures
From MaRDI portal
Publication:5740256
DOI10.1007/978-3-319-38898-4_20zbMATH Open1376.94053OpenAlexW2485875320MaRDI QIDQ5740256FDOQ5740256
Authors: Jian Liu, Sihem Mesnager, Lusheng Chen
Publication date: 25 July 2016
Published in: Information Security and Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-38898-4_20
Recommendations
Cited In (20)
- Methods of encrypting monotonic access structures
- Finding the maximal adversary structure from any given access structure
- Title not available (Why is that?)
- Title not available (Why is that?)
- Rearrangements of access structures and their realizations in secret sharing schemes
- Generalised cumulative arrays in secret sharing
- Title not available (Why is that?)
- Extensions of access structures and their cryptographic applications
- Secret sharing schemes on general access structures.
- Realizing secret sharing with general access structure
- An efficient and secure multi-secret sharing scheme with general access structures
- Title not available (Why is that?)
- Generation of key predistribution schemes using secret sharing schemes
- Progress in Cryptology - INDOCRYPT 2003
- Secret sharing schemes with bipartite access structure
- Title not available (Why is that?)
- Secret-Sharing Schemes: A Survey
- Secret sharing scheme with inherited characteristic
- Secret sharing schemes for compartmented access structures
- A perfect secret sharing scheme for general access structures
This page was built for publication: Secret sharing schemes with general access structures
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5740256)